2018-08-14 20:21:33 +10:00
using System.Globalization ;
2020-12-04 02:21:21 +11:00
using Microsoft.AspNetCore.Authorization ;
2020-06-22 10:08:08 +02:00
using Microsoft.AspNetCore.Http ;
2022-06-20 08:37:17 +02:00
using Microsoft.AspNetCore.Identity ;
2020-06-22 10:08:08 +02:00
using Microsoft.AspNetCore.Mvc ;
2021-10-07 09:51:04 +02:00
using Microsoft.Extensions.DependencyInjection ;
2020-09-21 09:52:58 +02:00
using Microsoft.Extensions.Logging ;
2020-12-04 02:21:21 +11:00
using Microsoft.Extensions.Options ;
2018-03-27 10:04:07 +02:00
using Newtonsoft.Json ;
2021-02-26 11:12:34 +00:00
using Umbraco.Cms.Core ;
2021-02-09 10:22:42 +01:00
using Umbraco.Cms.Core.Cache ;
using Umbraco.Cms.Core.Configuration.Models ;
using Umbraco.Cms.Core.Hosting ;
using Umbraco.Cms.Core.IO ;
using Umbraco.Cms.Core.Mapping ;
using Umbraco.Cms.Core.Media ;
using Umbraco.Cms.Core.Models ;
using Umbraco.Cms.Core.Models.ContentEditing ;
2021-02-26 11:12:34 +00:00
using Umbraco.Cms.Core.Models.Membership ;
2021-02-09 10:22:42 +01:00
using Umbraco.Cms.Core.Security ;
using Umbraco.Cms.Core.Services ;
using Umbraco.Cms.Core.Strings ;
2021-02-10 11:11:18 +01:00
using Umbraco.Cms.Web.BackOffice.Filters ;
2021-02-10 11:42:04 +01:00
using Umbraco.Cms.Web.Common.Attributes ;
using Umbraco.Cms.Web.Common.Authorization ;
2021-10-07 09:51:04 +02:00
using Umbraco.Cms.Web.Common.DependencyInjection ;
2021-02-26 14:21:23 +00:00
using Umbraco.Cms.Web.Common.Security ;
2020-05-18 13:00:32 +01:00
using Umbraco.Extensions ;
2013-11-12 18:07:10 +11:00
2022-06-20 08:37:17 +02:00
namespace Umbraco.Cms.Web.BackOffice.Controllers ;
/// <summary>
/// Controller to back the User.Resource service, used for fetching user data when already authenticated. user.service
/// is currently used for handling authentication
/// </summary>
[PluginController(Constants.Web.Mvc.BackOfficeApiArea)]
public class CurrentUserController : UmbracoAuthorizedJsonController
2013-11-12 18:07:10 +11:00
{
2022-06-20 08:37:17 +02:00
private readonly AppCaches _appCaches ;
private readonly IBackOfficeSecurityAccessor _backofficeSecurityAccessor ;
private readonly IBackOfficeUserManager _backOfficeUserManager ;
private readonly ContentSettings _contentSettings ;
private readonly IHostingEnvironment _hostingEnvironment ;
private readonly IImageUrlGenerator _imageUrlGenerator ;
private readonly ILocalizedTextService _localizedTextService ;
private readonly MediaFileManager _mediaFileManager ;
private readonly IPasswordChanger < BackOfficeIdentityUser > _passwordChanger ;
private readonly IShortStringHelper _shortStringHelper ;
private readonly IUmbracoMapper _umbracoMapper ;
private readonly IUserDataService _userDataService ;
private readonly IUserService _userService ;
[ActivatorUtilitiesConstructor]
public CurrentUserController (
MediaFileManager mediaFileManager ,
IOptionsSnapshot < ContentSettings > contentSettings ,
IHostingEnvironment hostingEnvironment ,
IImageUrlGenerator imageUrlGenerator ,
IBackOfficeSecurityAccessor backofficeSecurityAccessor ,
IUserService userService ,
IUmbracoMapper umbracoMapper ,
IBackOfficeUserManager backOfficeUserManager ,
ILocalizedTextService localizedTextService ,
AppCaches appCaches ,
IShortStringHelper shortStringHelper ,
IPasswordChanger < BackOfficeIdentityUser > passwordChanger ,
IUserDataService userDataService )
{
_mediaFileManager = mediaFileManager ;
_contentSettings = contentSettings . Value ;
_hostingEnvironment = hostingEnvironment ;
_imageUrlGenerator = imageUrlGenerator ;
_backofficeSecurityAccessor = backofficeSecurityAccessor ;
_userService = userService ;
_umbracoMapper = umbracoMapper ;
_backOfficeUserManager = backOfficeUserManager ;
_localizedTextService = localizedTextService ;
_appCaches = appCaches ;
_shortStringHelper = shortStringHelper ;
_passwordChanger = passwordChanger ;
_userDataService = userDataService ;
}
[Obsolete("This constructor is obsolete and will be removed in v11, use constructor with all values")]
public CurrentUserController (
MediaFileManager mediaFileManager ,
IOptions < ContentSettings > contentSettings ,
IHostingEnvironment hostingEnvironment ,
IImageUrlGenerator imageUrlGenerator ,
IBackOfficeSecurityAccessor backofficeSecurityAccessor ,
IUserService userService ,
IUmbracoMapper umbracoMapper ,
IBackOfficeUserManager backOfficeUserManager ,
ILoggerFactory loggerFactory ,
ILocalizedTextService localizedTextService ,
AppCaches appCaches ,
IShortStringHelper shortStringHelper ,
IPasswordChanger < BackOfficeIdentityUser > passwordChanger ) : this (
mediaFileManager ,
StaticServiceProvider . Instance . GetRequiredService < IOptionsSnapshot < ContentSettings > > ( ) ,
hostingEnvironment ,
imageUrlGenerator ,
backofficeSecurityAccessor ,
userService ,
umbracoMapper ,
backOfficeUserManager ,
localizedTextService ,
appCaches ,
shortStringHelper ,
passwordChanger ,
StaticServiceProvider . Instance . GetRequiredService < IUserDataService > ( ) )
{
}
2013-11-12 18:07:10 +11:00
/// <summary>
2022-06-20 08:37:17 +02:00
/// Returns permissions for all nodes passed in for the current user
2013-11-12 18:07:10 +11:00
/// </summary>
2022-06-20 08:37:17 +02:00
/// <param name="nodeIds"></param>
/// <returns></returns>
[HttpPost]
public Dictionary < int , string [ ] > GetPermissions ( int [ ] nodeIds )
2013-11-12 18:07:10 +11:00
{
2022-06-20 08:37:17 +02:00
EntityPermissionCollection permissions = _userService
. GetPermissions ( _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser , nodeIds ) ;
var permissionsDictionary = new Dictionary < int , string [ ] > ( ) ;
foreach ( var nodeId in nodeIds )
2019-12-18 13:05:34 +01:00
{
2022-06-20 08:37:17 +02:00
var aggregatePerms = permissions . GetAllPermissions ( nodeId ) . ToArray ( ) ;
permissionsDictionary . Add ( nodeId , aggregatePerms ) ;
2019-12-18 13:05:34 +01:00
}
2022-06-20 08:37:17 +02:00
return permissionsDictionary ;
}
2021-10-07 09:51:04 +02:00
2022-06-20 08:37:17 +02:00
/// <summary>
/// Checks a nodes permission for the current user
/// </summary>
/// <param name="permissionToCheck"></param>
/// <param name="nodeId"></param>
/// <returns></returns>
[HttpGet]
public bool HasPermission ( string permissionToCheck , int nodeId )
{
IEnumerable < string > p = _userService
. GetPermissions ( _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser , nodeId ) . GetAllPermissions ( ) ;
if ( p . Contains ( permissionToCheck . ToString ( CultureInfo . InvariantCulture ) ) )
{
return true ;
2019-12-18 13:05:34 +01:00
}
2022-06-20 08:37:17 +02:00
return false ;
}
2020-06-22 10:08:08 +02:00
2022-06-20 08:37:17 +02:00
/// <summary>
/// Saves a tour status for the current user
/// </summary>
/// <param name="status"></param>
/// <returns></returns>
public IEnumerable < UserTourStatus > PostSetUserTour ( UserTourStatus ? status )
{
if ( status = = null )
2018-08-14 20:21:33 +10:00
{
2022-06-20 08:37:17 +02:00
throw new ArgumentNullException ( nameof ( status ) ) ;
}
2018-08-14 20:21:33 +10:00
2022-06-20 08:37:17 +02:00
List < UserTourStatus > ? userTours = null ;
if ( _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser ? . TourData . IsNullOrWhiteSpace ( ) ? ? true )
{
userTours = new List < UserTourStatus > { status } ;
if ( _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser is not null )
2018-08-14 20:21:33 +10:00
{
2022-06-20 08:37:17 +02:00
_backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser . TourData =
JsonConvert . SerializeObject ( userTours ) ;
_userService . Save ( _backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser ) ;
2018-08-14 20:21:33 +10:00
}
2022-06-20 08:37:17 +02:00
return userTours ;
2018-08-14 20:21:33 +10:00
}
2022-06-20 08:37:17 +02:00
if ( _backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser . TourData is not null )
2018-08-14 20:21:33 +10:00
{
2022-06-20 08:37:17 +02:00
userTours = JsonConvert
. DeserializeObject < IEnumerable < UserTourStatus > > ( _backofficeSecurityAccessor . BackOfficeSecurity
. CurrentUser . TourData ) ? . ToList ( ) ;
UserTourStatus ? found = userTours ? . FirstOrDefault ( x = > x . Alias = = status . Alias ) ;
if ( found ! = null )
2018-08-14 20:21:33 +10:00
{
2022-06-20 08:37:17 +02:00
//remove it and we'll replace it next
userTours ? . Remove ( found ) ;
2018-08-14 20:21:33 +10:00
}
2022-06-20 08:37:17 +02:00
userTours ? . Add ( status ) ;
2018-08-14 20:21:33 +10:00
}
2022-06-20 08:37:17 +02:00
_backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser . TourData = JsonConvert . SerializeObject ( userTours ) ;
_userService . Save ( _backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser ) ;
return userTours ? ? Enumerable . Empty < UserTourStatus > ( ) ;
}
/// <summary>
/// Returns the user's tours
/// </summary>
/// <returns></returns>
public IEnumerable < UserTourStatus > ? GetUserTours ( )
{
if ( _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser ? . TourData . IsNullOrWhiteSpace ( ) ? ? true )
2018-03-27 10:04:07 +02:00
{
2022-06-20 08:37:17 +02:00
return Enumerable . Empty < UserTourStatus > ( ) ;
}
2018-03-27 10:04:07 +02:00
2022-06-20 08:37:17 +02:00
IEnumerable < UserTourStatus > ? userTours =
JsonConvert . DeserializeObject < IEnumerable < UserTourStatus > > ( _backofficeSecurityAccessor . BackOfficeSecurity
. CurrentUser . TourData ! ) ;
return userTours ? ? Enumerable . Empty < UserTourStatus > ( ) ;
}
2018-03-27 10:04:07 +02:00
2022-06-20 08:37:17 +02:00
public IEnumerable < UserData > GetUserData ( ) = > _userDataService . GetUserData ( ) ;
2022-04-01 11:09:51 +02:00
2022-06-20 08:37:17 +02:00
/// <summary>
/// When a user is invited and they click on the invitation link, they will be partially logged in
/// where they can set their username/password
/// </summary>
/// <param name="newPassword"></param>
/// <returns></returns>
/// <remarks>
/// This only works when the user is logged in (partially)
/// </remarks>
[AllowAnonymous]
public async Task < ActionResult < UserDetail ? > > PostSetInvitedUserPassword ( [ FromBody ] string newPassword )
{
BackOfficeIdentityUser ? user = await _backOfficeUserManager . FindByIdAsync ( _backofficeSecurityAccessor
. BackOfficeSecurity ? . GetUserId ( ) . ResultOr ( 0 ) . ToString ( ) ) ;
if ( user = = null )
{
throw new InvalidOperationException ( "Could not find user" ) ;
2018-03-27 10:04:07 +02:00
}
2022-06-20 08:37:17 +02:00
IdentityResult result = await _backOfficeUserManager . AddPasswordAsync ( user , newPassword ) ;
if ( result . Succeeded = = false )
2018-03-27 10:04:07 +02:00
{
2022-06-20 08:37:17 +02:00
//it wasn't successful, so add the change error to the model state, we've name the property alias _umb_password on the form
// so that is why it is being used here.
ModelState . AddModelError ( "value" , result . Errors . ToErrorMessage ( ) ) ;
2018-03-27 10:04:07 +02:00
2022-06-20 08:37:17 +02:00
return ValidationProblem ( ModelState ) ;
2018-03-27 10:04:07 +02:00
}
2017-09-12 16:22:16 +02:00
2022-06-20 08:37:17 +02:00
if ( _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser is not null )
2013-11-12 18:07:10 +11:00
{
2022-06-20 08:37:17 +02:00
//They've successfully set their password, we can now update their user account to be approved
_backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser . IsApproved = true ;
//They've successfully set their password, and will now get fully logged into the back office, so the lastlogindate is set so the backoffice shows they have logged in
_backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser . LastLoginDate = DateTime . UtcNow ;
_userService . Save ( _backofficeSecurityAccessor . BackOfficeSecurity . CurrentUser ) ;
}
2017-09-12 16:22:16 +02:00
2022-04-01 11:09:51 +02:00
2022-06-20 08:37:17 +02:00
//now we can return their full object since they are now really logged into the back office
UserDetail ? userDisplay =
_umbracoMapper . Map < UserDetail > ( _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser ) ;
2017-09-12 16:22:16 +02:00
2022-06-20 08:37:17 +02:00
if ( userDisplay is not null )
{
userDisplay . SecondsUntilTimeout = HttpContext . User . GetRemainingAuthSeconds ( ) ;
}
2022-04-01 11:09:51 +02:00
2022-06-20 08:37:17 +02:00
return userDisplay ;
}
2020-06-22 10:08:08 +02:00
2022-06-20 08:37:17 +02:00
[AppendUserModifiedHeader]
public IActionResult PostSetAvatar ( IList < IFormFile > file )
{
Attempt < int > ? userId = _backofficeSecurityAccessor . BackOfficeSecurity ? . GetUserId ( ) ;
var result = userId ? . ResultOr ( 0 ) ;
//borrow the logic from the user controller
return UsersController . PostSetAvatarInternal (
file ,
_userService ,
_appCaches . RuntimeCache ,
_mediaFileManager ,
_shortStringHelper ,
_contentSettings ,
_hostingEnvironment ,
_imageUrlGenerator ,
_backofficeSecurityAccessor . BackOfficeSecurity ? . GetUserId ( ) . Result ? ? 0 ) ;
}
2017-09-12 16:22:16 +02:00
2022-06-20 08:37:17 +02:00
/// <summary>
/// Changes the users password
/// </summary>
/// <param name="changingPasswordModel">The changing password model</param>
/// <returns>
/// If the password is being reset it will return the newly reset password, otherwise will return an empty value
/// </returns>
public async Task < ActionResult < ModelWithNotifications < string? > > ? > PostChangePassword (
ChangingPasswordModel changingPasswordModel )
{
IUser ? currentUser = _backofficeSecurityAccessor . BackOfficeSecurity ? . CurrentUser ;
if ( currentUser is null )
2017-09-12 16:22:16 +02:00
{
2022-06-20 08:37:17 +02:00
return null ;
2016-09-01 19:06:08 +02:00
}
2013-11-12 18:07:10 +11:00
2022-06-20 08:37:17 +02:00
changingPasswordModel . Id = currentUser . Id ;
2022-04-01 11:09:51 +02:00
2022-06-20 08:37:17 +02:00
// all current users have access to reset/manually change their password
2021-02-20 19:16:31 +00:00
2022-06-20 08:37:17 +02:00
Attempt < PasswordChangedModel ? > passwordChangeResult =
await _passwordChanger . ChangePasswordWithIdentityAsync ( changingPasswordModel , _backOfficeUserManager ) ;
2021-02-20 19:16:31 +00:00
2022-06-20 08:37:17 +02:00
if ( passwordChangeResult . Success )
{
// even if we weren't resetting this, it is the correct value (null), otherwise if we were resetting then it will contain the new pword
var result = new ModelWithNotifications < string? > ( passwordChangeResult . Result ? . ResetPassword ) ;
result . AddSuccessNotification ( _localizedTextService . Localize ( "user" , "password" ) , _localizedTextService . Localize ( "user" , "passwordChanged" ) ) ;
return result ;
}
2013-11-12 18:07:10 +11:00
2022-06-20 08:37:17 +02:00
if ( passwordChangeResult . Result ? . ChangeError ? . MemberNames is not null )
{
foreach ( var memberName in passwordChangeResult . Result . ChangeError . MemberNames )
2013-11-12 18:07:10 +11:00
{
2022-06-20 08:37:17 +02:00
ModelState . AddModelError ( memberName , passwordChangeResult . Result . ChangeError . ErrorMessage ? ? string . Empty ) ;
2013-11-12 18:07:10 +11:00
}
2022-06-20 08:37:17 +02:00
}
2013-11-12 18:07:10 +11:00
2022-06-20 08:37:17 +02:00
return ValidationProblem ( ModelState ) ;
}
2017-09-19 15:51:47 +02:00
2022-06-20 08:37:17 +02:00
// TODO: Why is this necessary? This inherits from UmbracoAuthorizedApiController
[Authorize(Policy = AuthorizationPolicies.BackOfficeAccess)]
[ValidateAngularAntiForgeryToken]
public async Task < Dictionary < string , string > > GetCurrentUserLinkedLogins ( )
{
BackOfficeIdentityUser identityUser = await _backOfficeUserManager . FindByIdAsync ( _backofficeSecurityAccessor
. BackOfficeSecurity ? . GetUserId ( ) . ResultOr ( 0 ) . ToString ( CultureInfo . InvariantCulture ) ) ;
2013-11-12 18:07:10 +11:00
2022-06-20 08:37:17 +02:00
// deduplicate in case there are duplicates (there shouldn't be now since we have a unique constraint on the external logins
// but there didn't used to be)
var result = new Dictionary < string , string > ( ) ;
foreach ( IIdentityUserLogin l in identityUser . Logins )
2020-08-20 11:54:35 +02:00
{
2022-06-20 08:37:17 +02:00
result [ l . LoginProvider ] = l . ProviderKey ;
2020-08-20 11:54:35 +02:00
}
2022-06-20 08:37:17 +02:00
return result ;
2013-11-12 18:07:10 +11:00
}
}